Operations | Monitoring | ITSM | DevOps | Cloud

Containers

The latest News and Information on Containers, Kubernetes, Docker and related technologies.

Dashboard Fridays: Sample Google Kubernetes Engine Dashboard

This SquaredUp dashboard shows key metrics from any GKE (Google Kubernetes Engine) clusters and node groups, including utilization of resources and health status. Tune in to learn how it was made, the challenges it solves, and our top tips for building it yourself.

Sysdig Monitor introduces native support for Microsoft Azure Monitor

Microsoft Azure Monitor allows customers to get critical details about their Azure cloud environments and services. The API for Azure Monitor can be a great way for teams to pull this information into their own storage systems for further analysis. However, it can be an overwhelming amount of data to process. Sysdig can help with this problem and eliminate time and effort. Here is how we do it …

How to Scale DevOps: 5 Keys to Success

DevOps is one of the core pillars of any organization. As the company grows, its processes also scale to absorb the new growth. Scaling DevOps is inevitable for any organization's growth. You cannot scale consistently if your DevOps processes involve a lot of manual steps and take much time to deliver new projects. A scalable DevOps means the system can expand automatically during a high workload and shrink back when the needs are reduced to normal.

How to build a service mesh with Istio and Calico

Microservices are loosely coupled software that provides flexibility and scalability to a cloud environment. However, securing this open architecture from vulnerabilities and malicious actors can be challenging without a service mesh. This blog post will demonstrate how you can create an Istio and Calico integration to establish a service mesh that will manipulate HTTP traffic in the application layer.

Exploiting IAM security misconfigurations and how to detect them

These three IAM security misconfiguration scenarios are rather common. Discover how they can be exploited, but also, how easy it is to detect and correct them. Identity and access management (IAM) misconfigurations are one of the most common concerns in cloud security. Over the last few years, we have seen how these security holes put organizations at increased risk of experiencing serious attacks on their Cloud accounts.

A comprehensive guide to cloud cost management

With 34% of cloud developers facing difficulties when calculating how much their cloud provider is going to charge them each month, it is essential to prioritize cloud cost management. This concept surrounds the process of monitoring, controlling, and optimizing an organization’s cloud service spend. By having the correct cloud cost management strategies in place, organizations are able to eliminate unnecessary expenses through optimizing resource allocation and cost-saving strategies.

Enterprise and Edge Scale Security with NeuVector Container Security 5.1

I’m excited to announce the general availability of the SUSE NeuVector container security platform version 5.1. With the 5.1 release, customers will benefit from more efficient and powerful vulnerability scanning and admission controls across multiple clusters through centralized enterprise scanning, auto-scaling scanners and support for the new Kubernetes (1.25+) pod security admission (PSA) standard. The release also supports the Cilium network plug-in.

Our Journey Into Cutting Kubernetes Costs by 40%

As companies start their Kubernetes and cloud-native journey, cloud infrastructures and services grow at a rapid pace. This happens all too often as organizations shift left without thorough controls, which can lead to overallocating and overspending on their Kubernetes environments. Organizations running workloads in the cloud can put budgets at risk when they lack information about key facts.